System Security/Hackers

Engineering researcher studies smart city cybersecurity Water and energy systems do not typically come to mind as cyber hacker targets, but those systems are often most vulnerable to such attacks, according to Javad Khazaei, assistant…

Credit: Purdue University/Somali Chaterji WEST LAFAYETTE, Ind. - A Purdue University data science and machine learning innovator wants to help organizations and users get the most for their money when it comes to cloud-based…

Attack could have been 800 times more destructive than the cyberattack that brought down parts of the Internet on the US's East Coast in 2016 In October 2016, a cyberattack temporarily took down Amazon, Reddit, Spotify and Slack for users…

Credit: U.S. Army RESEARCH TRIANGLE PARK, N.C. -- An Army scientist earned top honors from IEEE for big data security and privacy research. IEEE is the world's largest technical professional organization dedicated to advancing technology…

Using biologically inspired robotic swarms consisting of large groups of robots that have been programmed to operate cooperatively, much like individuals in an ant or bee colony, scientists from the University of Colorado demonstrate that…

Researchers propose a way of ensuring that genetic samples taken in the field for DNA fingerprinting arrive at the laboratory unalteredCredit: Mohamed Ibrahim, Duke University DURHAM, N.C. - Engineers at Duke University and the…

The IEEE S&P conference has bestowed the Best Practical Paper Award to Julien Gamba, Mohammed Rashed, Abbas Razaghpanah, Juan Tapiador and Narseo Vallina-Rodriguez for this work The article, "An analysis of Pre-installed Android…

Contributions recognized in areas including the internet, algorithms and artificial intelligenceCredit: Paul Mockapetris ACM, the Association for Computing Machinery, today announced the recipients of three prestigious technical…

Credit: Genevieve Martin/Oak Ridge National Laboratory, U.S. Dept. of Energy OAK RIDGE, Tenn., May 12, 2020 -- For the second year in a row, a team from the Department of Energy's Oak Ridge and Los Alamos national…

The first major UK study into victims of computer misuse crime has exposed the serious harm some victim's experience, as well as barriers to reporting such offences, receiving support, achieving justice and the precarious resources…

New cybersecurity study has significant implications as we increasingly work remotely during COVID-19 pandemic We believe we are less likely than others are to fall for phishing scams, thereby underestimating our own exposure to risk, a…

Threat detection and prevention are essential to ensuring the safety and security of warfighters. Researchers have developed a way to speed up the processing of extremely large graphs and data, making the most efficient use of modern Army…

Borders, regulation and global social media City, University of London's Professor Elaine Fahey (Jean Monnet Chair of Law & Transatlantic Relations), and its Institute for the study of European Law (ISEL) and International Law and…

Surprising findings might be less positive than they initially seem TROY, N.Y. -- Women are underrepresented in leadership positions throughout the information technology industry. While more and more women are earning degrees in science,…

Digital platforms connect researchers this year Since the outbreak and rapid spread of COVID-19, the Heidelberg Laureate Forum Foundation (HLFF) has been closely monitoring the pandemic and its impact. Following a painstaking examination…